Internet Privacy

Fetch Headings.ExtraData

Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the
Title,
Author,
Subject,
Chronological,
Dewey,
LoC, and
Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be...

On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ...

Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ...

Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying...

Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do thi...

According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...

We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...

Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t...

The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...

Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...

The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...

This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...

This issue features a number of items related to sustainability, ecology, and agriculture, including Vandana Shiva's article "Small is the New Big," the Council of Canadians' new report on water issue...

The activists who have put together Ours to Hack and to Own argue for a new kind of online economy: platform cooperativism, which combines the rich heritage of cooperatives with the promise of 21st-ce...

In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...

Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...

The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...

Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...

Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...

Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...

One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ...

Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-s...

Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...

Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance...

Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...

Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...

On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Priva...

The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have speci...

Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveilla...

Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha...

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwi...

EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...

David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...

From the Connexions Archives

A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...